Posts

Posts

typenameratingauthorhiveactivity
blog entryNominate an outstanding new researcher!0737Gia M ChevisThe Forum--The Blog of the International SectionpublicSeptember 2, 2016
blog entryJIS Conference 20160265JISC2016 Invitation.pdfRoger DebrecenyJIS Senior Editors' BlogpublicAugust 26, 2016
blog entryIn a sea of Big Data, what becomes of accounting and...0819Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Valuing Personal Data to Foster Privacy:...0174Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Repairing Organizational Legitimacy...0211Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Blogs as Research and Teaching Resources...2335Roger S DebrecenyJIS Senior Editors' BlogpublicSeptember 12, 2018
blog entryForthcoming paper: The Effect of Frequency and Automation of...0355Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 18, 2016
blog entryOverview of JIS paper: The effects of information...0212Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 9, 2016
blog entryOverview of Theme Issue on Enterprise Ontologies0175Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 6, 2016
blog entryHere's to a successful #iasmidyear20160883Gia M ChevisThe Forum--The Blog of the International SectionpublicFebruary 26, 2016
blog entryA new paper in JIS - Reporting Frequency and Presentation...0149Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS Paper. A Method to Evaluate Information...0128Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: IT Governance and the Maturity of IT...0276Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: The Relationship Between Board-Level...0151Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: SECURQUAL: An Instrument for...0144Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: Applying Basic Gamification...0177Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryJournal of Information Systems Conference 20160433Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 4, 2016
blog entryRemarks by Senior Editor, Mary Curtis, at the 2015 AAA...0376Roger S DebrecenyJIS Senior Editors' BlogpublicJanuary 27, 2016
blog entryDark Side of the Internet: Students can find almost...1467Richard E LillieTeaching with Technology > TwTpublicJanuary 15, 2016
blog entry2015 Survey of Faculty Attitudes on Technology0246Richard E LillieTeaching with Technology > TwTpublicOctober 14, 2015
announcementWebinar Series0737AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 25, 2015
resourcePre-conference resources for what are the Research...0478AAA HQAccounting IS Big Data (AiBD) > AiBD Research ResourcespublicSeptember 21, 2015
announcementPre-meeting Resources0577AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 21, 2015
announcement2015 Inaugural Event2856AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 29, 2015
blog entryThe "Book Trilogy" Becomes a "Quartet"0288Richard E LillieTeaching with Technology > TwTpublicSeptember 7, 2015
blog entryIf Content is King, It's Time to Overthrow the Monarchy!0353Richard E LillieTeaching with Technology > TwTpublicApril 24, 2015
blog entrySenior Editors' Update0165Roger S DebrecenyJIS Senior Editors' BlogpublicApril 16, 2015
blog entryTeaching in a Digital Age by A.W. (Tony) Bates --...0320Richard E LillieTeaching with Technology > TwTpublicApril 8, 2015
blog entryPhotos from JISC 20150202Roger S DebrecenyJIS Senior Editors' BlogpublicApril 8, 2015
blog entryCompetency-based education is all the rage: What is it?9835Richard E LillieTeaching with Technology > TwTpublicFebruary 21, 2019